Static task
static1
Behavioral task
behavioral1
Sample
372c45187e6695d1c4198d9115a1222f8b427d7e149ae9bd88a7f5b2269c15aa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
372c45187e6695d1c4198d9115a1222f8b427d7e149ae9bd88a7f5b2269c15aa.exe
Resource
win10v2004-20220812-en
General
-
Target
372c45187e6695d1c4198d9115a1222f8b427d7e149ae9bd88a7f5b2269c15aa
-
Size
280KB
-
MD5
3820d6a397c45a306ad91b8a5e82d220
-
SHA1
996a3c1891756790cc0329d4595cf3e5a011ba4a
-
SHA256
372c45187e6695d1c4198d9115a1222f8b427d7e149ae9bd88a7f5b2269c15aa
-
SHA512
238c0589a4702e54e90b55113dd6c8b12e557cfb188c452a68031f6559523cff16bc1ef3de4259d015d383547aa6363651361879f5c88476e29727d1a4cf37c0
-
SSDEEP
6144:uhGHayZS1YWQKJg8CVfKCr3WLDxYMLf3VwGhNtm1pCUlDXy2LssM6:us6YrWDyNhvDoY+V7/tyjF
Malware Config
Signatures
Files
-
372c45187e6695d1c4198d9115a1222f8b427d7e149ae9bd88a7f5b2269c15aa.exe windows x86
cfee27ac57b36b2aec2ca7e01d5b5b8a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsW
GetDateFormatA
RaiseException
SetConsoleTitleA
IsBadStringPtrA
_lwrite
FindResourceW
GlobalAddAtomW
CreateConsoleScreenBuffer
GetCompressedFileSizeA
GetDiskFreeSpaceA
SetupComm
ReadConsoleA
WritePrivateProfileStructA
GetCommTimeouts
ReadConsoleW
VirtualProtect
SetEvent
CreateRemoteThread
SetEnvironmentVariableW
GetSystemDirectoryA
GetComputerNameA
IsBadCodePtr
GetThreadTimes
SetHandleInformation
MoveFileExW
WaitForMultipleObjects
GetVersion
SetLocalTime
FillConsoleOutputCharacterW
GetVersionExA
GetModuleHandleA
GetStartupInfoA
user32
SetClipboardViewer
SetCapture
UnhookWinEvent
MonitorFromRect
SetScrollPos
UnionRect
SetWindowWord
CharNextA
GetSysColorBrush
GetUpdateRect
GetMenuDefaultItem
SendInput
IsZoomed
gdi32
CreatePen
CopyMetaFileW
CreateMetaFileW
advapi32
RegCreateKeyExW
SetServiceObjectSecurity
RegSetValueExW
RegSetKeySecurity
CreatePrivateObjectSecurity
RegEnumKeyExW
QueryServiceObjectSecurity
LookupAccountNameA
RegSetValueExA
CreateServiceA
GetAclInformation
LogonUserA
GetLengthSid
EnumDependentServicesA
AllocateAndInitializeSid
StartServiceW
CryptGetUserKey
GetServiceDisplayNameW
GetServiceDisplayNameA
RegQueryValueExA
InitializeSid
GetSidSubAuthority
LookupAccountSidW
GetSecurityDescriptorLength
GetNamedSecurityInfoW
RegCreateKeyA
shell32
SHChangeNotify
FindExecutableA
DragQueryFileW
Shell_NotifyIconA
DragQueryPoint
SHGetMalloc
ole32
CLSIDFromString
OleCreateLinkFromData
RevokeDragDrop
CoQueryClientBlanket
CoTreatAsClass
CoGetInterfaceAndReleaseStream
oleaut32
GetErrorInfo
VariantClear
SysAllocString
DispGetIDsOfNames
SafeArrayPutElement
SafeArrayPtrOfIndex
LoadTypeLi
SafeArrayCreate
CreateErrorInfo
shlwapi
StrFormatByteSizeA
PathIsSameRootW
StrTrimA
PathFindOnPathW
SHRegWriteUSValueW
UrlApplySchemeW
StrCmpNIA
StrCmpNW
PathStripPathA
PathAppendW
SHRegGetBoolUSValueA
StrRChrW
PathUnquoteSpacesA
PathIsDirectoryEmptyW
HashData
PathQuoteSpacesA
PathRemoveBackslashA
SHDeleteKeyW
setupapi
SetupOpenAppendInfFileW
SetupDiCreateDeviceInfoW
SetupDiSetDeviceInstallParamsA
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_XcptFilter
exit
_acmdln
_exit
Sections
.text Size: 268KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE